GIAC Certifications: Incident Response And Forensics

Becoming a GIAC Incident Response and Forensic Certified professional ensures that you have the knowledge and performance efficiency to hunt for cyber security threats and respond to incidents properly.

"I think the exam was both fair and practical. These are the kind of real world problems I expect to see in the field." - Carl Hallberg, GREM

Over 80% of all breach victims learn of a compromise from third-party notifications, not from internal security teams. In most cases, adversaries have been operating inside the victim's' network undetected for months or even years. A properly trained and GIAC Certified incident responder could be the only defense an organization has during a compromise. As a forensics investigator, you need to know what you're up against, and you need to have the most up-to-date knowledge of how to detect and fight it.

For forensic investigators, incident responders, security engineers, and IT administrators responsible for protecting the organization from malicious code. GREM holders have demonstrated the knowledge and skills to analyze and reverse-engineer malicious software that targets common platforms, as well as how to examine inner-workings of malware in the context of forensic investigations, incident
response, and Windows system administration.

For individuals seeking to demonstrate that they qualify to perform examinations employing network forensic artifact analysis. GNFA holders have demonstrated an understanding
of the fundamentals of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication and encrypted protocols.

For individuals seeking to demonstrate they are qualified to perform forensic examinations on smartphones and tablets. GASF holders have demonstrated an understanding of the fundamentals of mobile forensics, device file system analysis, smartphone application behavior, event artifact analysis and
the identification and analysis of smart device malware.